{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"forescout.com","crawled_at":"2026-03-18T06:04:41.43824Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":23172,"rendered_text_length":23172,"ghost_ratio":0,"rendering_type":"SSR","word_count":1418,"li_count":270,"tr_count":0,"th_count":0,"structure_score":19.040000915527344,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":1038,"total_html_bytes":340996,"useful_text_bytes":23172,"token_bloat_ratio":14.699999809265137,"images_total":69,"images_with_alt":30,"multimodal_pct":43,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":86151,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Forescout – Manage cyber risk and mitigate threats, continuously.","meta_description":"The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.","crawl_blocked":false,"ai_readiness_score":86,"sub_bot_access":100,"sub_rendering":100,"sub_structure":80,"sub_schema":42,"sub_tech_stack":85,"extractability_score":66,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":70,"acri_extractability":74,"acri_semantic_structure":75,"acri_content_integrity":65,"acri_retrieval_robustness":63,"acri_grade":"B","h1_text":"Forescout","h2_texts":"Forescout VistaroAI™: Agentic AI with Human-in-the-Loop Control | Your Journey to Universal Zero Trust Network Access Starts with the Forescout 4D Platform™ | What We Do | Securing the World’s Largest Organizations | The Forescout 4D Platform™ Advantage | The Most Important Cybersecurity Trends of 2025 | Customer Confidence | Schedule a Demo","tranco_rank":47050,"category":"healthcare","title_length":67,"meta_desc_length":249,"has_canonical":true,"canonical_url":"https://www.forescout.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":8,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Forescout – Manage cyber risk and mitigate threats, continuously.","og_description":"The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.","og_image":"https://www.forescout.com/wp-content/uploads/2026/01/what-we-do-discover.webp","twitter_card":"summary_large_image","ttfb_ms":1038,"dom_node_count":1460,"html_payload_kb":333,"has_hsts":true,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.forescout.com/sitemap_index.xml","internal_links":284,"external_links":17,"tracker_scripts":0,"tracker_token_pct":0,"global_score":70,"seo_pillar":67,"geo_pillar":78,"perf_pillar":47,"arch_pillar":84,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":54615,"ai_trust_percentile":0,"inbound_ai_links":2,"outbound_ai_links":17,"llm_analyzed":true,"llm_analyzed_at":"2026-03-02T17:47:46.0399Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Forescout Research Labs identified and disclosed multiple vulnerabilities in DTEN video conferencing and collaboration systems, addressing risks associated with sensitive","target_audience":"IT Security Professionals, System Administrators, CIOs, Enterprise Security Teams","pricing_model":"N/A - Research and Vulnerability Disclosure","integration_partners":["AWS S3"],"compliance_standards":["SOC 2","GDPR"],"competitive_moat":"Proactive vulnerability research and disclosure combined with detailed technical analysis and remediation guidance, offering a comprehensive security assessment for enterprise video conferencing solutions.","content_depth_score":9,"programmatic_seo_signals":["CVE-2019-16270","CVE-2019-16271","CVE-2019-16272","CVE-2019-16273","CVE-2019-16274"],"key_pain_points":["Data exposure via unencrypted S3 bucket","Unauthenticated web server exposing whiteboards","Arbitrary code execution via ADB","Factory settings access for data capture","Lack of TLS encryption"]}},"percentile":99,"similar_domains":[{"domain":"volunteerforever.com","acri_score":80,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":4.469999885559082,"page_title":"Best Meaningful Travel Programs Abroad | Volunteer Forever","h1_text":"Read  expert recommendations to plan your perfect meaningful trip abroad"},{"domain":"trinityhealth.org","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":2,"distance":4.909999942779541,"page_title":"Home - Trinity Health","h1_text":"How can we help you?"},{"domain":"blogs.juniper.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":5.219999957084656,"page_title":"HPE Juniper Networking Blogs | Insights and expertise","h1_text":"Juniper Blogs"},{"domain":"reliantmedicalgroup.org","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2.5,"schema_count":1,"distance":5.4599999427795405,"page_title":"Reliant Medical Group - Central Massachusetts Healthcare","h1_text":""},{"domain":"newly-registered-domains.whoisxmlapi.com","acri_score":81,"ai_readiness_score":84,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":1.899999976158142,"schema_count":1,"distance":5.489999949932098,"page_title":"Newly Registered Domains | WhoisXML API","h1_text":"Newly Registered Domains: Find hidden business opportunities and potential threats"}]}
